D-Link tells users to trash old VPN routers over bug too dangerous to identify

D-Link tells users to trash old VPN routers over bug too dangerous to identify

November 20, 2024 at 09:38AM

D-Link advises owners of older VPN routers to replace their devices due to a serious remote code execution vulnerability. The company won’t issue patches for end-of-life products but offers a 20% discount on a new router. Users are encouraged to update passwords and enable Wi-Fi encryption.

### Meeting Takeaways

1. **D-Link VPN Routers Vulnerability**:
– Owners of older D-Link VPN routers are advised to retire and replace their devices due to a serious remote code execution (RCE) vulnerability.
– The vulnerability is a buffer overflow bug that leads to unauthenticated RCE, with details kept confidential to prevent exploitation.
– While D-Link hasn’t assigned a CVE identifier, the risk is significant as it can potentially allow attackers access to connected devices.

2. **Risk Implications**:
– Continued use of the affected devices puts connected devices at risk of various attacks, including rootkit installation and adversary-in-the-middle attacks, though D-Link has not explicitly stated these risks apply to the current vulnerability.
– Vendors generally don’t call for product retirement without substantial cause, highlighting the seriousness of the situation.

3. **Apple’s Intel Mac Vulnerabilities**:
– Apple has released patches for two zero-day vulnerabilities affecting older Intel Macs (CVE-2024-44308 and CVE-2024-44309) found by Google’s Threat Analysis Group.
– Vulnerabilities are linked to Apple’s WebKit, affecting users of Safari and other browsers based on this engine across iPadOS, iOS, and visionOS.
– It is highly recommended to upgrade to macOS Sequoia 15.1.1 due to active exploits.

4. **EOL/EOS Policy & Support**:
– D-Link has stated that devices that have reached their end of life (EOL) or end of support (EOS) will not receive patches.
– A 20% discount on the new DSR-250v2 service router, which is not affected by the vulnerability, has been offered to affected users.
– D-Link advises regularly updating unique passwords for each device and ensuring Wi-Fi encryption is enabled for enhanced security.

5. **General Advice for Product Owners**:
– Users of affected D-Link products should be proactive in securing their devices and consider migration to supported models.
– D-Link emphasizes that they cannot provide support for EOL/EOS products, and users in the US must contact D-Link US, while international users should consult their regional offices.

### Next Steps:
– Inform all relevant stakeholders about the D-Link and Apple vulnerabilities.
– Encourage affected D-Link router users to take immediate action to secure or replace their devices.
– Monitor updates from both D-Link and Apple regarding any further security advisories or patches.

Full Article